Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key

被引:6
|
作者
Harun, Nur Ziadah [1 ,2 ]
Ahmad Zukarnain, Zuriati [1 ]
Hanapi, Zurina Mohd [1 ]
Ahmad, Idawaty [1 ]
机构
[1] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Serdang 43400, Selangor, Malaysia
[2] Univ Tun Hussein Onn Malaysia, Fac Comp Sci & Informat Technol, Dept Informat Secur & Web Technol, Parit Raja 86400, Malaysia
来源
SYMMETRY-BASEL | 2020年 / 12卷 / 09期
关键词
authentication key; half-wave plate; superposition state; unitary transformation; SPATIAL-MODE DEGREES; SINGLE PHOTONS; TRANSMISSION; POLARIZATION; PROTOCOL;
D O I
10.3390/sym12091481
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of authentication is required to be done three times based on the usage of unitary transformation that is only known between Alice and Bob. In the proposed protocol, a secure quantum handshake is utilized to share the secret polarization angle and an authentication key at the initial stage of authentication over the quantum channel. The symmetry key is used in this work to protect user data communication within the QSDC protocol, where the same secret key is used to encrypt and decrypt the message. This work adopts the information travel time (ITT) by allowing the sender to detect any interference from third parties. In addition, the operation of the Pauli-X quantum gate increases Eve's difficulty in stealing the information. The information transmitted is then continued by sending photons once in the quantum channel, which improves the efficiency without losing the message's security. In addition, to securely transfer the stream of messages, the proposed protocol is operated in single-stage, and the authentication is applied bit-by-bit, thus reducing the transmission time. Security checks are carried out along the data transmission process. Compared to previous protocols, this new initial authentication protocol has remarkable advantages since it does not require public communication to pre-share the authentication key and secret angles before the onset of the transmission, therefore, reducing the communication cost. Moreover, the secret authentication key and polarization angles are updated after a number of bits are sent to increase the security level. The verification process is also conducted to ensure the symmetry of the sender and receiver. The analyses presented herein demonstrate that the proposed authentication protocol is simple and secure in order to ensure the legitimacy of the users.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Multi-party Quantum Secure Direct Communication
    Tan, Xiaoqing
    Zhang, Xiaoqian
    Liang, Cui
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 251 - 255
  • [32] Quantum secure direct communication
    Li Xi-Han
    ACTA PHYSICA SINICA, 2015, 64 (16)
  • [33] Quantum secure direct communication
    LONG Gui-lu
    量子电子学报, 2014, 31 (01) : 120 - 120
  • [34] Impersonation attack on a quantum secure direct communication and authentication protocol with improvement
    Amerimehr, Ali
    Dehkordi, Massoud Hadain
    APPLIED PHYSICS B-LASERS AND OPTICS, 2018, 124 (03):
  • [35] Impersonation attack on a quantum secure direct communication and authentication protocol with improvement
    Ali Amerimehr
    Massoud Hadain Dehkordi
    Applied Physics B, 2018, 124
  • [36] Measurement device–independent quantum secure direct communication with user authentication
    Nayana Das
    Goutam Paul
    Quantum Information Processing, 21
  • [37] Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm
    Shyla, S. Immaculate
    Sujatha, S. S.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 151 - 163
  • [38] Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm
    S. Immaculate Shyla
    S. S. Sujatha
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 151 - 163
  • [39] Authentication of Quantum Secure Communication Under Noise
    Dong-fen Li
    Rui-jin Wang
    Ya-ming Yang
    Jin-lian Chen
    International Journal of Theoretical Physics, 2019, 58 : 1079 - 1087
  • [40] Authentication of Quantum Secure Communication Under Noise
    Li, Dong-fen
    Wang, Rui-jin
    Yang, Ya-ming
    Chen, Jin-lian
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (04) : 1079 - 1087